CISA Catalog of Known Exploited Vulnerabilities

Este script, que está diseñado para ser sencillo y eficaz, permite a los usuarios buscar en la base de datos del Catálogo CISA productos o proveedores específicos sin conexión y, a continuación, muestra información detallada sobre cualquier vulnerabilidad que haya sido identificada en esos productos o por esos proveedores. La información que se muestra también incluye el número CVE (Common Vulnerabilities and Exposures) de la vulnerabilidad, así como un enlace a la base de datos del NIST. También ofrece la posibilidad de mostrar información mejorada sobre CVE específicas.

Este script es especialmente útil para organizaciones y particulares que deben cumplir la nueva directiva emitida por la Cybersecurity & Infrastructure Security Agency (CISA), que obliga a los organismos federales a parchear los exploits de vulnerabilidades conocidas lo antes posible. Esta directiva tiene por objeto ayudar a proteger las redes y sistemas del gobierno de los ataques cibernéticos mediante la reducción del número de vulnerabilidades conocidas que pueden ser explotadas.

Como parte de esta directiva, CISA también está publicando una lista de vulnerabilidades conocidas para ayudar en este esfuerzo. Esta lista está a disposición del público y se puede acceder a ella a través del sitio web de CISA en https://www.cisa.gov/known-exploited-vulnerabilities-catalog. La lista se actualiza regularmente a medida que se descubren nuevas vulnerabilidades y puede utilizarse como referencia para que las organizaciones y los individuos identifiquen las vulnerabilidades conocidas y tomen las medidas adecuadas para mitigar los riesgos asociados a ellas.

Info

$ python cisa_known.py info

_________ .___  _________   _____    _________         __         .__
\_   ___ \|   |/   _____/  /  _  \   \_   ___ \_____ _/  |______  |  |   ____   ____
/    \  \/|   |\_____  \  /  /_\  \  /    \  \/\__  \   __ \__  \ |  |  /  _ \ / ___\
\     \___|   |/        \/    |    \ \     \____/ __ \|  |  / __ \|  |_(  <_> ) /_/  >
 \______  /___/_______  /\____|__  /  \______  (____  /__| (____  /____/\____/\___  /
        \/            \/         \/          \/     \/          \/           /_____/
Alexander Hagenah / ah@primepage.de / @xaitax / v 0.5

Title:   CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total:   975 vulnerabilities
URL:     https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Ayuda

$ python cisa_known.py -h
usage: cisa_known.py [-h] {update,info,recent,stats,product,vendor,all,enriched,export} ...

Search for a specific product/vendor in the CISA Catalog.

positional arguments:
  {update,info,recent,stats,product,vendor,all,enriched,export}
    update              Check for updates and download the most recent version
    info                Print information about the CISA Catalog
    recent              Show 5 most recent additions to the CISA Catalog
    stats               Print statistics about the CISA Catalog
    product             Search for a specific product in the CISA Catalog
    vendor              Search for a specific vendor in the CISA Catalog
    all                 Search for both product and vendor in the CISA Catalog
    enriched            Display detailed information about a CVE
    export              Export the data basic highcharts graphs

options:
  -h, --help            show this help message and exit

Búsqueda de producto

$ python cisa_known.py product "Office"

_________ .___  _________   _____    _________         __         .__
\_   ___ \|   |/   _____/  /  _  \   \_   ___ \_____ _/  |______  |  |   ____   ____
/    \  \/|   |\_____  \  /  /_\  \  /    \  \/\__  \   __ \__  \ |  |  /  _ \ / ___\
\     \___|   |/        \/    |    \ \     \____/ __ \|  |  / __ \|  |_(  <_> ) /_/  >
 \______  /___/_______  /\____|__  /  \______  (____  /__| (____  /____/\____/\___  /
        \/            \/         \/          \/     \/          \/           /_____/
Alexander Hagenah / ah@primepage.de / @xaitax / v 0.5

Title:   CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total:   975 vulnerabilities
URL:     https://www.cisa.gov/known-exploited-vulnerabilities-catalog


CVEs found: 31


CVE ID:  CVE-2018-0798
Product: Office
Vendor:  Microsoft
Name:    Microsoft Office Memory Corruption Vulnerability
Date:    2021-11-03
URL:     https://nvd.nist.gov/vuln/detail/CVE-2018-0798
Info:    Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0802.


CVE ID:  CVE-2018-0802
Product: Office
Vendor:  Microsoft
Name:    Microsoft Office Memory Corruption Vulnerability
Date:    2021-11-03
URL:     https://nvd.nist.gov/vuln/detail/CVE-2018-0802
Info:    Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0798.

[...]

Búsqueda por fabricante

$ python cisa_known.py vendor "Adobe"

_________ .___  _________   _____    _________         __         .__
\_   ___ \|   |/   _____/  /  _  \   \_   ___ \_____ _/  |______  |  |   ____   ____
/    \  \/|   |\_____  \  /  /_\  \  /    \  \/\__  \   __ \__  \ |  |  /  _ \ / ___\
\     \___|   |/        \/    |    \ \     \____/ __ \|  |  / __ \|  |_(  <_> ) /_/  >
 \______  /___/_______  /\____|__  /  \______  (____  /__| (____  /____/\____/\___  /
        \/            \/         \/          \/     \/          \/           /_____/
Alexander Hagenah / ah@primepage.de / @xaitax / v 0.5

Title:   CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total:   975 vulnerabilities
URL:     https://www.cisa.gov/known-exploited-vulnerabilities-catalog


CVEs found: 60


CVE ID:  CVE-2021-21017
Product: Acrobat and Reader
Vendor:  Adobe
Name:    Adobe Acrobat and Reader Heap-based Buffer Overflow Vulnerability
Date:    2021-11-03
URL:     https://nvd.nist.gov/vuln/detail/CVE-2021-21017
Info:    Acrobat Acrobat and Reader contain a heap-based buffer overflow vulnerability that could allow an unauthenticated attacker to achieve code execution in the context of the current user.


CVE ID:  CVE-2021-28550
Product: Acrobat and Reader
Vendor:  Adobe
Name:    Adobe Acrobat and Reader Use-After-Free Vulnerability
Date:    2021-11-03
URL:     https://nvd.nist.gov/vuln/detail/CVE-2021-28550
Info:    Adobe Acrobat and Reader contains a use-after-free vulnerability that could allow an unauthenticated attacker to achieve code execution in the context of the current user.

[...]

Información de CVE detallado

$ python cisa_known.py enriched "CVE-2023-36884"

_________ .___  _________   _____    _________         __         .__
\_   ___ \|   |/   _____/  /  _  \   \_   ___ \_____ _/  |______  |  |   ____   ____
/    \  \/|   |\_____  \  /  /_\  \  /    \  \/\__  \   __ \__  \ |  |  /  _ \ / ___\
\     \___|   |/        \/    |    \ \     \____/ __ \|  |  / __ \|  |_(  <_> ) /_/  >
 \______  /___/_______  /\____|__  /  \______  (____  /__| (____  /____/\____/\___  /
        \/            \/         \/          \/     \/          \/           /_____/
Alexander Hagenah / ah@primepage.de / @xaitax / v 0.5

Title:   CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total:   975 vulnerabilities
URL:     https://www.cisa.gov/known-exploited-vulnerabilities-catalog


{
    "Modified": "2023-07-17T19:21:00",
    "Published": "2023-07-11T19:15:00",
    "access": {},
    "assigner": "secure@microsoft.com",
    "capec": [],
    "cvss": null,
    "cwe": "NVD-CWE-noinfo",
    "id": "CVE-2023-36884",
    "impact": {},
    "last-modified": "2023-07-17T19:21:00",
    "references": [
        "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884"
    ],
    "summary": "Microsoft is investigating reports of a series of remote code execution vulnerabilities impacting Windows and Office products. Microsoft is aware of targeted attacks that attempt to exploit these vulnerabilities by using specially-crafted Microsoft Office documents.\n\nAn attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim. However, an attacker would have to convince the victim to open the malicious file.\n\nUpon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This might include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.\n\nPlease see the Microsoft Threat Intelligence  Blog https://aka.ms/Storm-0978 \u00a0Entry for important information about steps you can take to protect your system from this vulnerability.\n\nThis CVE will be updated with new information and links to security updates when they become available.\n\n",
    "vulnerable_configuration": [
        {
            "id": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
            "title": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
            "title": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
            "title": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
        },
        {
            "id": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
            "title": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*"
        },
        {
            "id": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
            "title": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*"
        },
        {
            "id": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
            "title": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
            "title": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
            "title": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
            "title": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
            "title": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*"
        },
        {
            "id": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*",
            "title": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*"
        }
    ],
    "vulnerable_configuration_cpe_2_2": [],
    "vulnerable_product": [
        "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
        "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
        "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
        "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
        "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*",
        "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*",
        "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:arm64:*",
        "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*",
        "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*",
        "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*",
        "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*",
        "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*",
        "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*",
        "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*",
        "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*",
        "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",
        "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*"
    ]
}

Las últimas 5 vulnerabilidades agregadas

$ python cisa_known.py recent

_________ .___  _________   _____    _________         __         .__
\_   ___ \|   |/   _____/  /  _  \   \_   ___ \_____ _/  |______  |  |   ____   ____
/    \  \/|   |\_____  \  /  /_\  \  /    \  \/\__  \   __ \__  \ |  |  /  _ \ / ___\
\     \___|   |/        \/    |    \ \     \____/ __ \|  |  / __ \|  |_(  <_> ) /_/  >
 \______  /___/_______  /\____|__  /  \______  (____  /__| (____  /____/\____/\___  /
        \/            \/         \/          \/     \/          \/           /_____/
Alexander Hagenah / ah@primepage.de / @xaitax / v 0.5

Title:   CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total:   975 vulnerabilities
URL:     https://www.cisa.gov/known-exploited-vulnerabilities-catalog


5 Most Recently Added Vulnerabilities:


CVE ID:  CVE-2023-3519
Product: NetScaler ADC and NetScaler Gateway
Vendor:  Citrix
Name:    Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability
Date:    2023-07-19
URL:     https://nvd.nist.gov/vuln/detail/CVE-2023-3519
Info:    Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.


CVE ID:  CVE-2023-36884
Product: Office and Windows
Vendor:  Microsoft
Name:    Microsoft Office and Windows HTML Remote Code Execution Vulnerability
Date:    2023-07-17
URL:     https://nvd.nist.gov/vuln/detail/CVE-2023-36884
Info:    Microsoft Office and Windows contain an unspecified vulnerability that allows an attacker to perform remote code execution via a specially crafted Microsoft Office document.


CVE ID:  CVE-2022-29303
Product: Compact
Vendor:  SolarView
Name:    SolarView Compact Command Injection Vulnerability
Date:    2023-07-13
URL:     https://nvd.nist.gov/vuln/detail/CVE-2022-29303
Info:    SolarView Compact contains a command injection vulnerability due to improper validation of input values on the send test mail console of the product's web server.


CVE ID:  CVE-2023-37450
Product: Multiple Products
Vendor:  Apple
Name:    Apple Multiple Products WebKit Code Execution Vulnerability
Date:    2023-07-13
URL:     https://nvd.nist.gov/vuln/detail/CVE-2023-37450
Info:    Apple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that can allow an attacker to execute code when processing web content.


CVE ID:  CVE-2023-32046
Product: Windows
Vendor:  Microsoft
Name:    Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability
Date:    2023-07-11
URL:     https://nvd.nist.gov/vuln/detail/CVE-2023-32046
Info:    Microsoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.

Top 10 Estadísticas ( Fabricante / Meses)

$ python cisa_known.py stats

_________ .___  _________   _____    _________         __         .__
\_   ___ \|   |/   _____/  /  _  \   \_   ___ \_____ _/  |______  |  |   ____   ____
/    \  \/|   |\_____  \  /  /_\  \  /    \  \/\__  \   __ \__  \ |  |  /  _ \ / ___\
\     \___|   |/        \/    |    \ \     \____/ __ \|  |  / __ \|  |_(  <_> ) /_/  >
 \______  /___/_______  /\____|__  /  \______  (____  /__| (____  /____/\____/\___  /
        \/            \/         \/          \/     \/          \/           /_____/
Alexander Hagenah / ah@primepage.de / @xaitax / v 0.5

Title:   CISA Catalog of Known Exploited Vulnerabilities
Version: 2023.07.19
Total:   975 vulnerabilities
URL:     https://www.cisa.gov/known-exploited-vulnerabilities-catalog


Top 10 Vendors:
Microsoft: 265
Cisco: 63
Apple: 61
Adobe: 60
Google: 48
Oracle: 32
Apache: 28
VMware: 18
D-Link: 15
Citrix: 12

Top 10 Months:
2021-11: 291
2022-03: 226
2022-05: 83
2022-06: 49
2022-04: 45
2022-01: 40
2022-02: 32
2022-09: 25
2023-06: 24
2022-08: 23

Github oficial

Filed under
Herramientas
Previous Next
For this post, the comments have been closed.